Touch state-of-the-art security and management, Security and management, Solution case study – Konica Minolta BIZHUB C220 User Manual
Page 6
6
IEEE802.1X Compatibility Active Directory Coordination External-server Authentication
POP before SMTP
NDS Authentication over TCP/IP IP Filtering
A variety of advanced authentication methods prevents unauthorised access and information leakage.
Biometric Finger-Vein Authentication*
Our original innovative finger vein identification makes forged access
virtually impossible. Easy use and precision technology ensure critical
information safety.
* Requires optional Authentication Unit AU-102.
Non-Contact IC Card Authentication*
This non-contact IC smart card system grants access with a single touch.
It can be used with your existing ID card system, so updating information
is easily manageable.
* Requires optional Authentication Unit AU-201.
Users must painstakingly enter ID and
password, while administrators must make
extra effort to manually set passwords.
ID and password entry is unnecessary. Existing
employee IC cards can be used, and updating
information is easily manageable.
By scanning each user’s unique finger vein pattern,
the Biometric Reader eliminates need for passwords
and ensures accurate identification.
There is a risk of stolen and leaked passwords.
Each user must have a card of his/her own. There
is a risk of card loss or unauthorised card lending.
Biometric authentication is among the most
secure methods of ensuring exceptional safety.
Eliminate unauthorised access with stringent user authorisation
Advanced Authentication Function for network and server
Authentication type
Ease of use
Mid-level
Mid-level
High-level
High-level
None
WT-506 , AU-201
High-level
High-level
WT-506 , AU-102
Security
Additional options
Password
IC card
Biometric
Security and Management
Touch state-of-the-art security and management.
Solution Case Study
Brokerage / IT Solutions Manager
“ Data asset protection and centralised
administration reduce our costs.”
Our company manages confidential information. In the past, our main
challenge was to build an open and secure network environment that
would prevent information leakage. Through the high-level user
authorisation in bizhub, we achieved such a system. Moreover,
PageScope Enterprise Suite software makes the system flexible and
secure enough for comprehensive management of all device
information. With bizhub, we’ve affordably made our business more
secure and convenient.
Adopt various network security and communication data encryption measures.
Employ outstanding security with a cutting-edge user authentication system.
Protect documents with passwords and an embedded copy prevention code
that prevents unauthorised output.
Utilise counter data collection and cost management for each device and user
with authorisation.
Solutions
Issues
Developing a secure environment for network printing and data sharing.
Preventing information leakage from the corporate network.
Preventing document alteration and reducing unauthorised duplication.
Establishing solid, cost-effective management at the group and individual level.